Terms and Conditions
Review FlowHunt.io’s Terms and Conditions covering user obligations, data privacy, features, payments, and legal terms.
Updated: 30.5.2025
1. Introduction
Welcome to Flowhunt.io, a service provided by QualityUnit (more information about the company on www.qualityunit.com). By accessing or using the FlowHunt.io Service, you agree to comply with and be bound by these Terms. If you do not agree with these Terms, please do not use the FlowHunt.io Service.
2. Definitions
- “User”: Any individual or entity using the Flowhunt.io Service.
- “Service”: The Flowhunt.io, including all features and functionalities, recommendations, and suggestions provided by OpenAI’s language models and multiple APIs.
- “API”: Application programming interfaces integrated into the chatbot Service to provide additional functionalities.
3. Usage Terms
3.1 Eligibility
By using the Service, you represent and warrant that you are at least 18 years old or the legal age of majority in your jurisdiction.
3.2 License
We grant you a non-exclusive, non-transferable, revocable license to access and use the Service for personal and business purposes in accordance with these Terms.
4. User Responsibilities
4.1 Accurate Information
You agree to provide accurate, current, and complete information when using the Service and to maintain and update your information as necessary.
4.2 Compliance with Laws
You agree to comply with all applicable laws and regulations when using the Service.
5. Prohibited Conduct
You agree not to:
- Use the Service for any unlawful purpose.
- Upload, post, or transmit any content that is illegal, harmful, or offensive.
- Interfere with or disrupt the operation of the Service or servers connected to the Service.
- Attempt to gain unauthorized access to any part of the Service, other accounts, computer systems, or networks.
6. Account and Payment Terms
6.1 Account Security
You are responsible for maintaining the security of your account and for all activities that occur under your account.
6.2 Payment
If any part of the Service is provided for a fee, you agree to pay the amounts specified and adhere to our payment terms.
6.3 Logo Usage
By registering for our Service and choosing any plan, you grant FlowHunt.io the right to use your logo, name, and brand solely for marketing purposes, including but not limited to showcasing your usage of FlowHunt.io flows on our website, promotional materials, and presentations. If you wish to opt out of this provision, you may notify us in writing at support@flowhunt.io.
6.4 Refunds and Cancellations
Payments made for the Service are non-refundable unless otherwise required by applicable law. If you wish to cancel your subscription, you may do so at any time; however, no refunds or credits will be issued for partial periods of use.
7. Privacy Policy
Our use of your data is covered by our Privacy Policy, which outlines how we collect, use, and protect your information.
8. AI Models and Data Usage
FlowHunt integrates with various AI models and APIs to provide enhanced functionalities. The use of these models is subject to their respective terms and conditions, which are summarized below. The AI models are trained on a mixture of data sources, including licensed data, data created by human trainers, and publicly available data. These models are designed to generate text, images, or other types of media based on user input. FlowHunt does not guarantee the accuracy, reliability, or completeness of the outputs generated by these models. FlowHunt does not guarantee that the outputs will be free from errors, omissions, or inaccuracies. FlowHunt does not grant rights to licensed content, even if it is generated by AI models. The outputs are generated based on patterns learned from training data and may not always reflect factual information or current events. FlowHunt.io uses various AI models, including OpenAI, Amazon Bedrock, Anthropic, Google Vertex AI, Microsoft Azure AI, Grok (xAI), and Groq. Each model has its own practices regarding data security, model security, model training, data hosting and locality, and data privacy. Below is a summary of these practices for each model.
8.1 OpenAI
8.1.1 Data Security
OpenAI data security practices are available here.
8.1.2 Model Security
FlowHunt.io uses pre-trained OpenAI models, and Service Data will never be used by OpenAI for any purpose other than to provide and secure its service to Subscribers. Once the output is delivered, the Service Data is deleted.
8.1.3 Model Training
OpenAI will never use Service Data for model training or any other form of service improvement.
8.1.4 Data Hosting and Locality
OpenAI currently processes Service Data in the United States. However, OpenAI does not store or host Service Data because it is promptly deleted after providing the output.
8.1.5 Data Privacy
FlowHunt.io uses OpenAI’s ‘Zero Data Retention’ policy so that no Service Data is stored or hosted by OpenAI after the output has been delivered. As a result, using OpenAI does not impact Subscribers’ ability to comply with various privacy laws (including GDPR and CCPA) when using FlowHunt.
8.2 Amazon Bedrock
8.2.1 Data Security
Amazon Bedrock employs robust security measures, including encryption of data in transit and at rest, and leverages AWS’s secure infrastructure. Access controls and network security are implemented to protect data processed by the service.
8.2.2 Model Security
Models on Amazon Bedrock are protected against unauthorized access and tampering through AWS’s security protocols. Foundational models are managed by AWS or third-party providers with their respective security measures.
8.2.3 Model Training
By default, data processed by Amazon Bedrock foundation models is not used to train the original base models or distributed to third-party model providers. Users may have options to fine-tune models with their own data, which is managed within their AWS account and subject to their control.
8.2.4 Data Hosting and Locality
Data processed by Amazon Bedrock is typically hosted within the AWS region selected by the user. Specific data residency and processing locations depend on the chosen models and AWS service configurations.
8.2.5 Data Privacy
Amazon Bedrock is designed to help users comply with applicable privacy laws. User data processed by the service is handled in accordance with the AWS Privacy Notice and Data Processing Addendum. Users control their data and can manage its use and retention.
8.3 Anthropic
8.3.1 Data Security
Anthropic implements industry-standard security practices to protect data, including encryption and access controls. Our systems are designed to safeguard the confidentiality and integrity of user inputs and model outputs.
8.3.2 Model Security
Anthropic’s models are developed and hosted with security in mind, employing measures to prevent unauthorized access or misuse. We continuously work to ensure the robustness of our model security.
8.3.3 Model Training
Data submitted to Anthropic’s generally available API services is not used to train our models by default. For specific enterprise offerings or features, data usage for training will be explicitly outlined in the relevant service terms.
8.3.4 Data Hosting and Locality
Data processed by Anthropic’s services may be hosted in various secure data centers. Information regarding specific data storage locations can be found in our service documentation or by contacting support.
8.3.5 Data Privacy
Anthropic is committed to data privacy and processes data in accordance with our Privacy Policy. We aim to provide transparency and control over personal information as required by applicable privacy regulations.
8.4 Google Vertex AI, Gemini, and PaLM
8.4.1 Data Security
Google Cloud’s Vertex AI, including models like Gemini and PaLM, benefits from Google’s comprehensive security infrastructure, featuring data encryption, network security, and access controls to protect customer data.
8.4.2 Model Security
Google employs rigorous security measures to protect its AI models from unauthorized access and malicious activities. Model integrity and availability are key priorities.
8.4.3 Model Training
Customer data processed by Google’s Vertex AI services is not used to train Google’s general foundation models unless explicitly agreed upon by the customer (e.g., for custom model training). Google provides clear information on data usage for model improvement.
8.4.4 Data Hosting and Locality
Data processed via Google Vertex AI can be configured for specific regions, allowing customers to control data residency in line with their requirements and Google Cloud’s regional service availability.
8.4.5 Data Privacy
Google Cloud’s AI services are designed to comply with privacy laws like GDPR and CCPA. Google’s Data Processing and Security Terms outline its commitments to data privacy and protection.
8.5 Microsoft Azure AI
8.5.1 Data Security
Microsoft Azure AI services are built on Azure’s secure cloud infrastructure, which includes advanced security features like data encryption, threat detection, and identity management to protect customer data.
8.5.2 Model Security
Microsoft employs robust security practices to safeguard its AI models, including those available through Azure AI, ensuring they are protected from unauthorized access and misuse.
8.5.3 Model Training
Customer data sent to Azure AI services is not used to train Microsoft’s publicly available foundation models by default. Customers retain control over their data and its use for any custom model training or fine-tuning.
8.5.4 Data Hosting and Locality
Azure AI services allow customers to specify the geographic regions where their data is processed and stored, supporting data residency and compliance requirements.
8.5.5 Data Privacy
Microsoft is committed to data privacy and provides comprehensive documentation, including its Privacy Statement and Data Protection Addendum, detailing how Azure AI services handle data in compliance with global privacy regulations.
8.6 Grok (xAI)
8.6.1 Data Security
xAI’s Grok is developed with a focus on security. Measures are expected to include data encryption and secure infrastructure to protect user interactions and data. Users should refer to official xAI documentation for specific commitments.
8.6.2 Model Security
Security for the Grok model aims to prevent unauthorized access and ensure its integrity. Specific security architecture details will be made available through xAI’s official channels.
8.6.3 Model Training
Information regarding whether user data is used to train Grok will be provided in xAI’s terms of service and privacy policy. Users should consult these documents for clarity on data usage for model improvement.
8.6.4 Data Hosting and Locality
Details on where data processed by Grok is hosted and processed will be outlined by xAI. Users should refer to xAI’s official documentation for specifics on data residency.
8.6.5 Data Privacy
xAI’s approach to data privacy for Grok will be detailed in its privacy policy, outlining how user data is collected, used, and protected in line with applicable privacy laws.
8.7 Groq
8.7.1 Data Security
Groq’s LPU™ Inference Engine and cloud services are designed with security in mind, focusing on protecting data processed through their hardware and platform. This includes measures for data in transit and at rest.
8.7.2 Model Security
Groq’s platform, when hosting AI models, ensures that the models and the inference process are secured against unauthorized access and interference.
8.7.3 Model Training
Groq primarily provides inference hardware and related cloud services. Data sent for inference on Groq’s platform is typically not used for training models unless explicitly part of a separate agreement or service offering.
8.7.4 Data Hosting and Locality
Data processed by Groq’s cloud services may be hosted in specific data centers. Customers should consult Groq’s service agreements for details on data hosting locations and residency options.
8.7.5 Data Privacy
Groq is committed to protecting data privacy. Its privacy policy and service agreements will detail how user data and data processed for inference are handled in compliance with relevant privacy regulations.
9. User-Generated Content
9.1 Ownership and Responsibility
You retain ownership of any intellectual property rights that you hold in the content you create, upload, or store through the Service (“User-Generated Content”). You are solely responsible for your User-Generated Content as well as for usage of AI Generated Content and the consequences of posting or publishing it. AI Generated images or content can be used for commercial purposes, but you must ensure that the images do not infringe on any third-party rights, including copyright, trademark, or privacy rights. FlowHunt.io does not claim ownership of AI-generated images created using the Service. You should avoid to generate obscene content, objectionable, or that infringes on the rights of any third party, including intellectual property rights, privacy rights, or rights of publicity. You also agree not to submit User-Generated Content that contains any viruses, worms, or other harmful code.
9.2 License to FlowHunt.io
By providing User-Generated Content to the Service, you grant FlowHunt.io a worldwide, non-exclusive, royalty-free, sublicensable, and transferable license to use, reproduce, distribute, prepare derivative works of, display, and perform the User-Generated Content in connection with the Service and FlowHunt.io’s (and its successors’ and affiliates’) business, including for promoting and redistributing part or all of the Service.
9.3 Prohibited Content
You agree not to submit User-Generated Content that is unlawful, defamatory, libelous
Ready to build your own AI?
Smart Chatbots and AI tools under one roof. Connect intuitive blocks to turn your ideas into automated Flows.